Biblio

Export 21393 results:
2011
Minchev, Zlatogor, Kiril Boianov, and Hristo Turlakov. Critical Infrastructure Attacks In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2011.
ENISA. Critical Infrastructures and Services: Maritime., 2011.
Johannessen, Ola M., and Martin W. Miles. "Critical Vulnerabilities of Marine and Sea Icebased Ecosystems in the High Arctic." Regional Environmental Change (2011).
Khan, Muhammad Khurram, Soo-Kyun Kim, and Khaled Alghathbar. "Cryptanalysis and Security Enhancement of a “More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme”." Computer Communications 34, no. 3 (2011).
Georgiev, Venelin. Current issues in the acquisition of multirole fighters for the Bulgarian air force In CSDM Views. Sofia: Centre for Security and Defence Management, 2011.
Georgiev, Venelin. Current issues in the acquisition of multirole fighters for the Bulgarian air force In CSDM Views. Sofia: Centre for Security and Defence Management, 2011.
Gorman, Siobhan, and Julian E. Barnes. "Cyber Combat: Act of War ." The Wall Street Journal (2011).
Halder, Debarati, and K. Jaishankar. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations. Information Science Reference, 2011.
Láng, Judit. "Cyber Defence after Lisbon and the Implications of NATO’s New Strategic Concept." Information & Security: An International Journal 26, no. 1 (2011): 7-11.
Schmitt, Michael N.. "Cyber operations and the Jus Ad Bellum revisited." Villanova Law Review 3 (2011): 569-605.
Schmitt, Michael N.. "Cyber Operations and the Jus Ad Bellum Revisited." Villanova Law Review 56, no. 3 (2011): 569-605.
Phahlamohlaka, Jackie, Joey Jansen Van Vuuren, and A. C. Coetzee. Cyber Security Awareness Toolkit for National Security: An Approach to South Africa’s Cyber Security Policy Implementation., 2011.
Cyber Security in the UK In Postnote. Houses of Parliament Parliamentary Office of Science and Technology, 2011.
Ashenden, Debi. "Cyber Security: Time for Engagement and Debate." In European Conference on Information Warfare and Security., 2011.
Androulidakis, Iosif. Cybercrime in Fixed Telephony Systems In Seminar 62/2011, High Tech & Cyber Crime. Brdo near Kranj, Slovenia: European Police College (CEPOL), 2011.
Cybercrime situation report In Joint Project on Regional Cooperation against Cybercrime. CyberCrime@IPA - EU/COE, 2011.
Minchev, Zlatogor. Cybersecurity and cyberdefence – elements of smart defence in 21st Century In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2011.
Lewis, James A., and Katrina Timlin. Cybersecurity and Cyberwarfare Preliminary Assessment of National Doctrine and Organization. Washington, D.C.: Center for strategic and international studies, 2011.
Editorial. "Cybersecurity Challenges and Responses." Information & Security: An International Journal 26, no. 1 (2011): 5-6.
Macaulay, Tyson. Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS. Boston, MA: Auerbach Publications, 2011.
Cybersecurity Strategy for Germany. Federal Ministry of the Interior, 2011.
Dubov, Dmytro V., and Mykola A. Ozgevan. Cybersecurity: the World Tendencies and Challenge for Ukraine. NІSR, 2011.
Betz, David J., and Tim Stevens. Cyberspace and the State: Toward a Strategy for Cyber-Power. New York: Routledge, 2011.
Goel, Sanjay. "Cyberwarfare: Connecting the Dots in Cyber Intelligence." Communications of the ACM 54, no. 8 (2011): 132-140.
CyberWinter 2011 Exercise. Sofia: Ministry of Transport, Information Technologies and Communications, 2011.

Pages